Product manual
These risks consist of flaws
in legitimate software that
can be exploited, either to
cause damage, block data, or
steal information.
Vulnerabilities are usually
exploited through network
connections.
Vulnerabilities
Types of threats
Threats consist of the software that has been
deliberately designed to destroy, modify, disclose, or
block your data.
Threats fall into the following categories:
Viruses are the small
programs that attach
themselves to other programs
and replicate themselves.
Viruses
Worms are like viruses in that
they copy themselves from
PC to PC, but they do not
attach themselves to other
programs.
Worms
These destructive programs
claim to be some other type
of program, but they cause
damage when they run.
Trojan horses
Norton 360 scans your PC for viruses, worms, Trojan
horses, and other software that is intentionally
destructive. It also monitors your Internet connection
to protect you from the Internet-based threats that
exploit software vulnerabilities.
Understanding alerts and messages
Types of threats
240